-
Avast:
Limpio -
Avira:
Limpio -
Bitdefender:
Limpio -
Kaspersky:
Limpio -
NOD32:
Limpio
Los registros detallados
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Module2 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet4 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet2 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet1 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\dir OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet3 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet9 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet6 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet5 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet8 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet7 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Module1 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_4 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet19 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet11 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet10 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet12 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet13 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_2 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet26 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Sheet25 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_0 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_1 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_3 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_6 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_5 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\Module11 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\__SRP_7 OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\ThisWorkbook OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\VBA\_VBA_PROJECT OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_VBA_PROJECT_CUR\PROJECTwm OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>Workbook OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_1_CompObj OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_5_SummaryInformation OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls|>_5_DocumentSummaryInformation OK
T-20-50-52.zip|>Tasks-20-50-52 Ver1.46.xls OK
T-20-50-52.zip|>Copy Restore Spreadsheet Note.txt OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\PROJECT OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\__SRP_3 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\Sheet1 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\dir OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\__SRP_1 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\__SRP_0 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\__SRP_2 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\__SRP_5 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\__SRP_4 OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\ThisWorkbook OK
T-20-50-52.zip|>Copy Restore.xls|>_VBA_PROJECT_CUR\VBA\_VBA_PROJECT OK
T-20-50-52.zip|>Copy Restore.xls|>Workbook OK
T-20-50-52.zip|>Copy Restore.xls|>_1_CompObj OK
T-20-50-52.zip|>Copy Restore.xls|>_5_SummaryInformation OK
T-20-50-52.zip|>Copy Restore.xls|>_5_DocumentSummaryInformation OK
T-20-50-52.zip|>Copy Restore.xls OK
T-20-50-52.zip|>Note About Excel Macros.txt OK
T-20-50-52.zip OK
#
# Number of scanned files: 56
# Number of scanned folders: 0
# Number of infected files: 0
# Total size of scanned files: 40623450
# Virus database: 130502-1, 05/02/13
# Total scan time: 0:0:4
Copyright (c) 1992 - 2012 AVG Technologies
Program version 2013.0.3349, engine 2013.0.3204
Virus Database: Version 3204/6494 2013-07-15
------------------------------------------------------------
Test started: 16.7.2013 13:46:52
Duration of test: 3 second(s)
------------------------------------------------------------
Objects scanned : 5
Found infections : 0
Found rootkit : 0
Found high severity : 0
Found med severity : 0
Found info severity : 0
Fixed rootkit : 0
Fixed high severity : 0
Fixed med severity : 0
Fixed info severity : 0
------------------------------------------------------------
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.12.78
VDF Version: 7.11.90.186
Scan start time: 7/16/2013 4:46:50 PM
Command line: g:\scancl.exe --nombr --showall --verboselog /a /z /s --log=d:\scanner\output.tmp d:\scanner\downloads\149353\T-20-50-52.zip
configuration file: g:\scancl.conf
d:\scanner\downloads\149353\T-20-50-52.zip
Date: 16.07.2013 Time: 16:46:34 Size: 3309793
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 5
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Jul 20 23:59:39 o*-*
// Command line: /arc /list /nohed /log=d:\scanner\output.tmp T-20-50-52.zip
// Core: AVCORE v2.1 Windows/x86_64 11.0.1.6 (Mar 26, 2013)
// Engines: scan: 14, unpack: 10, archive: 50, mail: 8
// Total signatures: 9212798
//
T-20-50-52.zip ok
T-20-50-52.zip=>Tasks-20-50-52 Ver1.46.xls ok
T-20-50-52.zip=>Copy Restore Spreadsheet Note.txt ok
T-20-50-52.zip=>Copy Restore.xls ok
T-20-50-52.zip=>Note About Excel Macros.txt ok
Results:
Folders :0
Files :5
Packed :0
Archives :1
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :21
Files/second :5
Scan time :00:00:01
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "T-20-50-52.zip" Enable = Yes Recursive = No
; ------------------
2013-07-16 16:46:51 T-20-50-52.zip archive ZIP
2013-07-16 16:46:51 Scan_Objects$35666 running 50%
2013-07-16 16:46:51 T-20-50-52.zip//Tasks-20-50-52 Ver1.46.xls archive Embedded
2013-07-16 16:46:51 T-20-50-52.zip//Tasks-20-50-52 Ver1.46.xls//ThisWorkbook ok
2013-07-16 16:46:51 T-20-50-52.zip//Tasks-20-50-52 Ver1.46.xls//Module2 ok
2013-07-16 16:46:51 T-20-50-52.zip//Tasks-20-50-52 Ver1.46.xls//Module11 ok
2013-07-16 16:46:51 T-20-50-52.zip//Tasks-20-50-52 Ver1.46.xls ok
2013-07-16 16:46:52 T-20-50-52.zip//Copy Restore Spreadsheet Note.txt ok
2013-07-16 16:46:52 T-20-50-52.zip//Copy Restore.xls archive Embedded
2013-07-16 16:46:52 T-20-50-52.zip//Copy Restore.xls//ThisWorkbook ok
2013-07-16 16:46:52 T-20-50-52.zip//Copy Restore.xls ok
2013-07-16 16:46:52 T-20-50-52.zip//Note About Excel Macros.txt ok
2013-07-16 16:46:52 T-20-50-52.zip ok
2013-07-16 16:46:52 Scan_Objects$35666 completed
; --- Statistics ---
; Time Start: 2013-07-16 16:46:51
; Time Finish: 2013-07-16 16:46:52
; Completion: 100%
; Processed objects: 9
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 3
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 6.0.316.0, (C) 1992-2013 ESET, spol. s r.o.
Module loader, version 1042 (20130123), build 1050
Module perseus, version 1401 (20130712), build 1532
Module scanner, version 8573 (20130716), build 14413
Module archiver, version 1172 (20130624), build 1140
Module advheur, version 1142 (20130712), build 1107
Module cleaner, version 1073 (20130617), build 1085
Command line: --base-dir=d:\av\eset /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=d:\scanner\output.tmp T-20-50-52.zip
Scan started at: 07/16/13 16:46:39
name="T-20-50-52.zip", threat="is OK", action="", info=""
name="T-20-50-52.zip - ZIP - Tasks-20-50-52 Ver1.46.xls", threat="is OK", action="", info=""
name="T-20-50-52.zip - ZIP - Copy Restore Spreadsheet Note.txt", threat="is OK", action="", info=""
name="T-20-50-52.zip - ZIP - Copy Restore.xls", threat="is OK", action="", info=""
name="T-20-50-52.zip - ZIP - Note About Excel Macros.txt", threat="is OK", action="", info=""
Scan completed at: 07/16/13 16:46:40
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 4
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Download3k's recomendaciones de seguridad
1. Instale un antivirus
Con el fin de mantener tu ordenador libre de malware, le recomendamos que siempre tenga instalado un programa antivirus, sobre todo para descarga e instalación de nuevos programas de la web. Por lo menos una vez al día, siga su programa de actualización de bases de datos. Esto permitirá que su antivirus sea al día con las últimas amenazas de software maligno y proteja mejor sus datos informáticos.
Si aun no tiene una potente solución antivirus para proteger su ordenador, usted puede tomar en cuenta una de nuestras recomendaciones: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Elija un navegador web seguro
Una cosa importante a tener en cuenta es el navegador web que utilice. La mayoría de los vulnerabilidades de seguridad y virus atacan Internet Explorer por lo que es mejor que usted considere otra alternativa. Los navegadores web más seguros disponibles Hoy en día se consideran Mozilla Firefox et Google Chrome. Además de ser gratis, ambos son rápidos, tienen bloqueo de ventanas emergentes, pestañas de navegación, con privacidad y características de seguridad. Probarlos: Descarga Mozilla Firefox ou Descarga Google Chrome.
3. Obtenga más información sobre cómo proteger su PC
Estos artículos deben ayudarle más (Inglés):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenga el código HTML para el presente informe
Enlace Gráfico
Texto del Enlace
- Ejemplo:Employee Task Scheduling for One Year Antivirus informe realizado por Download3k.es.
- HTML:
- Code de forum: